General
-
Target
805bc38aa1a5c30fe18cdc3bf46e4a4a1e43a8f0499f2f2b16bca72395a41539
-
Size
2.0MB
-
Sample
240525-d9jjsadc7w
-
MD5
0bf46dac0e557ddfd400618c989f3f02
-
SHA1
6454812b7b9e7858017d87f851ca0c2094a07f2a
-
SHA256
805bc38aa1a5c30fe18cdc3bf46e4a4a1e43a8f0499f2f2b16bca72395a41539
-
SHA512
6451648cabb09fcba9da080dac892d3d3fdc21341359e73374aeea820ca34fe7b7de8c170762751eb1d17ba64a4938278d684047f8c7655108b394bc23f7de07
-
SSDEEP
49152:s4K3x1vUmJtTF+TxMoxc1TU+j+dAzGwlrh:s4Ex18mtIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
805bc38aa1a5c30fe18cdc3bf46e4a4a1e43a8f0499f2f2b16bca72395a41539.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
Extracted
vidar
https://steamcommunity.com/profiles/76561199689717899
https://t.me/copterwin
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
805bc38aa1a5c30fe18cdc3bf46e4a4a1e43a8f0499f2f2b16bca72395a41539
-
Size
2.0MB
-
MD5
0bf46dac0e557ddfd400618c989f3f02
-
SHA1
6454812b7b9e7858017d87f851ca0c2094a07f2a
-
SHA256
805bc38aa1a5c30fe18cdc3bf46e4a4a1e43a8f0499f2f2b16bca72395a41539
-
SHA512
6451648cabb09fcba9da080dac892d3d3fdc21341359e73374aeea820ca34fe7b7de8c170762751eb1d17ba64a4938278d684047f8c7655108b394bc23f7de07
-
SSDEEP
49152:s4K3x1vUmJtTF+TxMoxc1TU+j+dAzGwlrh:s4Ex18mtIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-